Пікірлер
@Jafar-Biri
@Jafar-Biri 3 күн бұрын
hi how i can contact you?
@HadrienCOSTA-ROBERT
@HadrienCOSTA-ROBERT 7 күн бұрын
Thank you a lot for this share of precious informations. This seems like a fascinating environnement. Thanks again
@edvinte
@edvinte 19 күн бұрын
viking 🗣️🔥
@stoneman5919
@stoneman5919 26 күн бұрын
hey bro, How to hook an application if it is reinforced ?
@hlcd-7191
@hlcd-7191 3 ай бұрын
Hello, Can i did same thing with IOS Apps, i have IOS App that need to subscribe to unlimited
@MioLifeReset
@MioLifeReset 3 ай бұрын
Good afternoon sir, is it possible to crack an application like an injector using a login using this method?
@alexdin1565
@alexdin1565 5 ай бұрын
That's amazing
@isaakbruno7437
@isaakbruno7437 5 ай бұрын
hi how i can contact you? for a custom project
@user-sh1fv9mm2v
@user-sh1fv9mm2v 6 ай бұрын
thank you very much, helped me alot!
@RomySaputraSihananda
@RomySaputraSihananda 7 ай бұрын
makasih abangku sayang 🤯🤯🥳🥳🥳🥳😥😥😥
@Shekelgrubb228
@Shekelgrubb228 7 ай бұрын
Hi, I am trying to reproduce the steps (dicer app) I am using real rooted device, android 13, Frida 16.1.11 and for instance frida-trace does not capture the clicks or other interactions in real time. Also I use the same script as yours but it does not print out the arguments, could someone please help ?thank you
@wrathofainz
@wrathofainz 7 ай бұрын
And here I was just staring at decompiled smali code xD
@darrenpayne4114
@darrenpayne4114 7 ай бұрын
FFFAAARRRKKK i hate GREAT getting started videos that completely dont mention any setup information for people. i felt so over my head when i switched to linux. thats what made cody from nullbyte so good. he would always start off with heres what im using and the tools you'll need to follow this video "now that you have these tools installed we can begin" but i guess if noobs arent your target audience i suppose
@darrenpayne4114
@darrenpayne4114 7 ай бұрын
so guys if your using linux, to connect to your android over usb look at setting up android=sdk maybe look at scrcpy....youll figure it out
@wrathofainz
@wrathofainz 7 ай бұрын
Best thing to do is when you encounter running something new like adb at 5:44 just look up how to install and use it. Seems tedious, but that's research.
@nathanfrancecyrexfgtsbalan4102
@nathanfrancecyrexfgtsbalan4102 8 ай бұрын
Bro, if I pay you, will you break an apk for me?
@asdfasdfasdf383
@asdfasdfasdf383 10 ай бұрын
Simply amazing. Of course most real world apps won't have such a convenient "hideAds" flag, but great for educational purposes anyway. High quality video.
@SubNovelBL
@SubNovelBL Жыл бұрын
friend, I would like to know if you could make the subtitles in English officially available because the subtitles automatically generated by KZbin are terrible and there is little quality content like yours
@njack4806
@njack4806 Жыл бұрын
Great video
@fairyroot1653
@fairyroot1653 Жыл бұрын
I really appreciate the work you do, I mod apps and use Frida, it's good to see them married in one video.
@linkzap
@linkzap 3 ай бұрын
are you ope fo commissions ?
@fairyroot1653
@fairyroot1653 3 ай бұрын
@@linkzap sure
@mhamademad
@mhamademad Жыл бұрын
frida-trace -J doesn't work anymore it seems like...
@mhamademad
@mhamademad Жыл бұрын
there is not a single browser as secure as firefox.
@mhamademad
@mhamademad Жыл бұрын
hm
@mhamademad
@mhamademad Жыл бұрын
ur really good at this damn
@LuisSantos-dk1ox
@LuisSantos-dk1ox Жыл бұрын
Thanks for making this Video. Do you guys make or have more resources like this that dives deep using Frida for more complex mobile applications ? Besides Frida documentation, and the owasp UnCrackable exercises.
@talhahOne
@talhahOne Жыл бұрын
can anyone help me out, I have got a apk. I just want to see if it can be re engineered. any programmers expert of android coding etc etc. its a apk file. Cheers
@khanra17
@khanra17 Жыл бұрын
Great video please don't whisper
@serialkiller8783
@serialkiller8783 Жыл бұрын
why did you pass const/4 while patching smali ? why not just const v11?
@codemad
@codemad Жыл бұрын
Continue the tutorial like this BTW how to online bypass signature
@yonatanhaldarov
@yonatanhaldarov Жыл бұрын
WHERE HAVE YOU BEEN A YEAR AGO! Thanks for the video, I have a question that is not particularly frida related - Do you know if it is possible to fake a dns response to an android emulator or phone that are not connected to the internet, namely StandAlone? More specifically - I am reversing an app that is sending a lot of requests to multiple servers and than waits for the right encrypted response from the server. Then the app decrypts it and compares it to a const string. I wanted to fake the response with the encrypted string to have a proof that I am correct with my decryption. I will be glad if you'll answer, Thanks!
@0xffsweden918
@0xffsweden918 Жыл бұрын
Glad you liked it! In your situation I would probably have the phone tether network over USB to a computer running dnsmasq (can act as a dhcp server and serve fake dns responses) and a web server. If the app is using SSL you'll need to install a custom CA certificate and possibly disable cert pinning in the app if used.
@itsamitsh
@itsamitsh Жыл бұрын
May I ask How to run Frida on real device that is not rooted ? Help is highly appreciated.
@yonatanhaldarov
@yonatanhaldarov Жыл бұрын
I will suggest to ask chatGpt, I am sure its answer will satisfy you :) Nevertheless, I read that it is possible by installing frida-gadget or something like that, have fun!
@itsamitsh
@itsamitsh Жыл бұрын
@@yonatanhaldarov u have a packed one apk with Frida gadget
@CorruptedModz2nd
@CorruptedModz2nd Жыл бұрын
you probably cant, mayby an virtual space apk but wouldt know how to replicate it
@eloyam9973
@eloyam9973 Жыл бұрын
This is so cool
@DavisFreimanis
@DavisFreimanis 2 жыл бұрын
Really good talk! I was able to replicate the TV4Play example on my phone, but I was not required to bypass the certificate pinning. Did you install a certificate for your MitM proxy on the phone? I installed my Burp certificate as a system certificate and that worked without a problem.
@0xffsweden918
@0xffsweden918 2 жыл бұрын
Thanks. Yes, I didn't go into detail of the MITM-setup but you're absolutely right in that it requires you to add the proxy CA-cert to the phone. Of course this is only needed for the exploration phase and the final patch works without root or custom CA-certs, yet another reason to have a dedicated phone for testing stuff out on.
@asepd7159
@asepd7159 2 жыл бұрын
Auto subs. What i best method to undetect for example banking app apk in root device? 1. Is that using magisk module, as we know that apk developer will update day by day so we hard to follow frequently every an update that support with magisk module. 2. Reverse engineering updateble apk with downgrade manifest? 3. You suggestion sir?
@0xffsweden918
@0xffsweden918 2 жыл бұрын
Great question. Personally I would never do banking on a rooted phone considering all the security implications, so that rules out option 1. I would patch the app statically and recompile and if there is an issue that it keeps getting updated I usually just change the app package name to not have the app store app recognize it.
@testingchannel4203
@testingchannel4203 2 жыл бұрын
Great instructional video, could You possible make one with Frida + Flutter? Not SSL pinning but some patching on the fly with frida? To print some values out that goes in and goes out from onClick functions? Thanks.
@aliaziz498
@aliaziz498 2 жыл бұрын
did you have any articles video book websites .. any things that related to android reverse engineering
@forsalw4782
@forsalw4782 2 жыл бұрын
how to find encryption and decryption method in an application please this is very important
@forsalw4782
@forsalw4782 2 жыл бұрын
how to find encryption and decryption method in an application please this is very important
@munnahossen9847
@munnahossen9847 2 жыл бұрын
:gar:
@user-sh1fv9mm2v
@user-sh1fv9mm2v 2 жыл бұрын
This is wonderful! Thanks
@neerajverma9226
@neerajverma9226 3 жыл бұрын
Hello how to find native codes/decompile it?
@MrAnhell
@MrAnhell 3 жыл бұрын
Are you available for hire?
@den_3696
@den_3696 3 жыл бұрын
You can decompile smali to java with jadx
@blocksource4192
@blocksource4192 2 жыл бұрын
Can you please let me know more about this? Do you have documentation available for me to work with this?
@hds7178
@hds7178 3 жыл бұрын
how to disable network connection for ads in smali.
@sleepyNovember_project
@sleepyNovember_project 2 жыл бұрын
By exploring code with attention bro And deleting everything what can be deleted in classes for ads
@onelgates
@onelgates 2 жыл бұрын
Please indicate a concrete answer and sample in deleting in classes for ads
@rickyray2794
@rickyray2794 3 жыл бұрын
"all without touching the phone.... except for when we plugged up the rubber ducky" lmao, no good shit man. Question though, since most androids are USB-C will a normal USB-USBC converter work?
@BatteryProductions
@BatteryProductions 3 жыл бұрын
awesome!
@ivypanny3813
@ivypanny3813 3 жыл бұрын
thank you and I look forward to see more detail tutorial for beginners......this is great
@dheaamohammad1265
@dheaamohammad1265 3 жыл бұрын
can i dm you i need help please
@user4gent416
@user4gent416 3 жыл бұрын
2160p ? wft
@opticalbeast4947
@opticalbeast4947 3 жыл бұрын
Where is a book/guide/pdf on reading and understanding the smali from decompiled dex files.
@GameSmilexD
@GameSmilexD 2 жыл бұрын
if anyone else has the same question just use google
@obi1692
@obi1692 11 ай бұрын
Search "whats-the-best-way-to-learn-smali-and-how-when-to-use-dalvik-vm-opcodes" And you will find a stackoverflow post with some resources
@Mobile-yi6bf
@Mobile-yi6bf 17 күн бұрын
I understand 100% your comment I see so many sites and video but not anyone explain Smali codes 😢
@mm-musicmiso8158
@mm-musicmiso8158 3 жыл бұрын
I need to learn reverse engineering sir. I got cheated by teen patti apps. They are fraud and cheaters. All pri planned. I need to screw them. I need to do mod for app. Help me 8073196425,
@mm-musicmiso8158
@mm-musicmiso8158 3 жыл бұрын
Please update about setup